Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 07:02
Static task
static1
Behavioral task
behavioral1
Sample
c488428598c8b77ae9a87c494467e416_JaffaCakes118.dll
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c488428598c8b77ae9a87c494467e416_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
c488428598c8b77ae9a87c494467e416_JaffaCakes118.dll
-
Size
1.2MB
-
MD5
c488428598c8b77ae9a87c494467e416
-
SHA1
d6fd46cdbec1b0f3f6465c7f823b8f8f285a37b8
-
SHA256
8ac37fc17d40290bb1bd932383ca3b99da2cf2629b2dc3efddeecd8f8cfb5e13
-
SHA512
a3e5ac2a8ed73353150f762db6e052b350c00c86678e960ef16335dbca06b10be427c43d4c59f05349c0fe30b65749d28e7b2b5feb5c1bfad128474f2a41e96d
-
SSDEEP
24576:GuYfg4LhHr4NFXKJO1aUiDBvZ2+ITHmpclO9NYt:m9cKrUqZWLAcU
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3348-4-0x0000000003560000-0x0000000003561000-memory.dmp dridex_stager_shellcode -
Executes dropped EXE 3 IoCs
Processes:
Magnify.exemspaint.exeprintfilterpipelinesvc.exepid Process 1668 Magnify.exe 2400 mspaint.exe 2824 printfilterpipelinesvc.exe -
Loads dropped DLL 5 IoCs
Processes:
Magnify.exemspaint.exeprintfilterpipelinesvc.exepid Process 1668 Magnify.exe 2400 mspaint.exe 2824 printfilterpipelinesvc.exe 2824 printfilterpipelinesvc.exe 2824 printfilterpipelinesvc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Vfaxdafbicozcso = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Crypto\\RSA\\S-1-5-21-4182098368-2521458979-3782681353-1000\\eN9PdJ\\mspaint.exe" -
Processes:
Magnify.exemspaint.exeprintfilterpipelinesvc.exerundll32.exedescription ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Magnify.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mspaint.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA printfilterpipelinesvc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Event Triggered Execution: Accessibility Features 1 TTPs
Windows contains accessibility features that may be used by adversaries to establish persistence and/or elevate privileges.
-
Modifies registry class 2 IoCs
Processes:
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
rundll32.exepid Process 3532 rundll32.exe 3532 rundll32.exe 3532 rundll32.exe 3532 rundll32.exe 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 3348 -
Suspicious use of AdjustPrivilegeToken 8 IoCs
Processes:
description pid Process Token: SeShutdownPrivilege 3348 Token: SeCreatePagefilePrivilege 3348 Token: SeShutdownPrivilege 3348 Token: SeCreatePagefilePrivilege 3348 Token: SeShutdownPrivilege 3348 Token: SeCreatePagefilePrivilege 3348 Token: SeShutdownPrivilege 3348 Token: SeCreatePagefilePrivilege 3348 -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
pid Process 3348 -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
description pid Process procid_target PID 3348 wrote to memory of 2492 3348 94 PID 3348 wrote to memory of 2492 3348 94 PID 3348 wrote to memory of 1668 3348 95 PID 3348 wrote to memory of 1668 3348 95 PID 3348 wrote to memory of 2000 3348 96 PID 3348 wrote to memory of 2000 3348 96 PID 3348 wrote to memory of 2400 3348 97 PID 3348 wrote to memory of 2400 3348 97 PID 3348 wrote to memory of 764 3348 98 PID 3348 wrote to memory of 764 3348 98 PID 3348 wrote to memory of 2824 3348 99 PID 3348 wrote to memory of 2824 3348 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\c488428598c8b77ae9a87c494467e416_JaffaCakes118.dll,#11⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
PID:3532
-
C:\Windows\system32\Magnify.exeC:\Windows\system32\Magnify.exe1⤵PID:2492
-
C:\Users\Admin\AppData\Local\A4rubw\Magnify.exeC:\Users\Admin\AppData\Local\A4rubw\Magnify.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1668
-
C:\Windows\system32\mspaint.exeC:\Windows\system32\mspaint.exe1⤵PID:2000
-
C:\Users\Admin\AppData\Local\rOdizJ\mspaint.exeC:\Users\Admin\AppData\Local\rOdizJ\mspaint.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2400
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe1⤵PID:764
-
C:\Users\Admin\AppData\Local\KGog\printfilterpipelinesvc.exeC:\Users\Admin\AppData\Local\KGog\printfilterpipelinesvc.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2824
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Accessibility Features
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD510772a6540495734fe454f63a524a3c6
SHA1b7c091ec96cbae4179057bd2195d62e3a27e7539
SHA2567a992c3eab02a547b88ce12319396c9de2ed629a01134fd77b261f3da1d76e0b
SHA51228850fbe346824f2e4558e4f8bf5f05f7603a973c831b68fb90f16e3a80d1cbfdbee764565e18967df0cde018917135eb3e406770819100b2f7dc8e050091adc
-
Filesize
639KB
MD54029890c147e3b4c6f41dfb5f9834d42
SHA110d08b3f6dabe8171ca2dd52e5737e3402951c75
SHA25657137f784594793dc0669042ccd3a71ddbfedeb77da6d97173d82613e08add4d
SHA512dbdc60f8692f13c23dbed0b76e9c6758a5b413bd6aaf4e4d0ba74e69c0871eb759da95c3f85a31d972388b545dcf3bb8abbcbedd29a1e7e48c065130b98b893d
-
Filesize
1.2MB
MD5ec028cfb6ead020c2801f518a9f13ef7
SHA100e184283ac1c936ddc43251c41d333373a3225d
SHA2567043044c37deaf04d1a3e1792a4167b69068cbfb8abd8a1aba37c7ab2c730341
SHA512b2e73c44a196181a8dc3a6290b084db21d68697d2dcf55fdbc16040cc01ffc1c73cd170bf90973eb0ae07ecbd24a7f00c4e410301c2441120ac5a37fe03aa0f6
-
Filesize
813KB
MD5331a40eabaa5870e316b401bd81c4861
SHA1ddff65771ca30142172c0d91d5bfff4eb1b12b73
SHA256105099819555ed87ef3dab70a2eaf2cb61076f453266cec57ffccb8f4c00df88
SHA51229992dbf10f327d77865af5e6ebbe66b937a5b4ad04c68cafbf4e6adbd6c6532c8a82ac7e638d97c1f053353a7c8a6d7e379f389af15443c94a1e8f9b16be5f8
-
Filesize
1.2MB
MD5b6c1d90a3657069e39f138fe9ad774f8
SHA171b3bdd3b0d4d88688212de58a88addfdbc8e0f3
SHA25607610adac2f0f8613bdfed4b5b4c1ed26e6bd0b2ed9c3f8b967386310007716c
SHA51205d08a77388e706e0ec2312898b15be3ef1a7e2cdcf85d5f72c08ca1fdf736a754fc185a04f7a68c2b2c83220ed859fb3345d826a23799f7837bd82fdbc4a0b1
-
Filesize
965KB
MD5f221a4ccafec690101c59f726c95b646
SHA12098e4b62eaab213cbee73ba40fe4f1b8901a782
SHA25694aa32a2c9c1d2db78318d9c68262c2f834abe26b6e9a661700324b55fdd5709
SHA5128e3f4e4f68565ef09f5e762d6bb41b160711bbacac9dfcbe33edea9885fd042e6ce9a248bfcc62f9cffdb8e6bbe1b04c89bd41fcd9a373a5c8bc7bbff96dceaf
-
Filesize
1KB
MD5d659f47ce4d418dc0791ae0caa0e2b8f
SHA11e8a329f4274afbc1547494f2c46e08bb296d37a
SHA2565556686f8668cd4a86dbc88ff04738801b9665089da863a5b59ebc3dc62fe2dd
SHA5128acb1cf33612ed8362cd5d9ef5d715639cd4f7da45524f77514a99ec28b762d00bfe1b7d662d0aa3d9a3b080d76938141593b5e20ae64398423a3b7ad7da61a8